Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

The History of Ethical Hacking and Penetration Testing

When we think of hackers, the black hat variety usually comes to mind. However, white hat hacking, also known as "ethical hacking", has been around as early as the 1960's. Check out the infographic above to see how it all started, where it is today, and trends we expect to see in the near future.

Have You Seen Linda Allen's new Candida System yet? It's called "Yeast Infection No More" I've read the whole thing (all 150 pages) and there's some great information in there about how to naturally and permanently eliminate your yeast infection without drugs, creams or any kind of gimmicks. I highly recommend it - it's very honest and straightforward without all the hype and b.s. you see all over the net these days. Here's the website where you can get more information: ●●● https://tinyurl.com/y3flbeje

The History of Ethical Hacking and Penetration Testing

1.
THEHISTORYOFETHICALHACKING
TIMELINE1939-2014
THEFUTUREOFETHICALHACKING
The “bombe” becomes the world’s first
ethical hacking machine. It was used by
the British to help decipher encrypted
German messages during World War II.
Computer “penetration” is first discussed
by leading experts, with mention of
deliberate tests by professionals.
The first “tiger team” is formed.
USAF contracted James Anderson
to test time-sharing systems.
The US Computer Fraud and
Abuse Act makes black and gray
hat hacking a criminal offense.
The US Air Force conducts one of the first
ethical hacks to test the security of
the Multics operating system.
The PTES is founded leading to an increase in
ethical hacking jobs. They offer businesses and
security service providers a common language
and scope for performing penetration testing.
1939
1960
1971
1974
1986
1995
1999
2003
2009
2014
[1] https://www.trustwave.com/trustednews/2013/09/infographic-timeline-15-key-dates-ethical-hacking-history/
[2] http://www.businessinsider.com/google-paid-white-hat-hackers-more-than-15-million-dollars-2015-1#ixzz3UZIA71UG
[3] http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
[4] http://www.codesandciphers.org.uk/virtualbp/tbombe/thebmb.htm
[5] http://www.rsaconference.com/writable/presentations/file_upload/tech-w02-a-penetration-testing-model_v2.pdf
[6] http://www.gartner.com/newsroom/id/2828722
Attacking your own defense to locate
weaknesses has been around for over
1,500 years. Ethical hacking brings
that practice into the digital world
Google paid white hat hackers more
than $1.5 million in 2014 to find bugs
The term “ethical hacking” was first
used by IBM’s John Patrick in 1995
The First Bug Bounty Program was launched
by Netscape in 1995. Hackers were offered
rewards for reporting vulnerabilites to the
company before they could be exploited
Dan Farmer and Wietse Venema release
SATAN, an automated vulnerability
scanner, which becomes a popular
hacking tool.
OWASP releases the first OWASP
Testing Guide to help teach best
practices in penetration testing.
Worldwide enterprise security spending
reaches $71.1B. Security executives begin
to use on-demand penetration testing
services for cost effective ethical hacking.
Software security goes mainstream with
Microsoft's Windows 98 release, 1999
becomes a banner year for security
(and hacking).
BUGBOUNTYPROGRAMSGROWINPOPULARITY
FORMALGUIDELINES&PRACTICESDEVELOP
CERTIFICATIONCOURSESBECOMETHENORM
ETHICALHACKINGPRACTICESENTERIOTSPACE
PTES
Netscape
20142013 2015
$65.5B
$71.1B $76.9B$75.9B